Lecture 8 - Security
Lecture 8 - Security
LECTURE 8
Objectives
• Describe the challenges of securing information
• Define information security and explain why it is
important
• Identify the types of attackers that are common
today
• List the basic steps of an attack
• Describe the five basic principles of defense
2
Computer Security is the ability of a system to protect
information and system resources with respect to
confidentiality and integrity.
Aspects of Security:
• Prevention: Take measures that prevent your assets from being damaged
• Detection: Take measures so that you can detect when, how, and by whom an
asset has been damaged
• Reaction: Take measures so that you can recover your assets or to recover from a
damage to your assets
Where to focus security controls?
9
Defining Information Security
• Security
– Steps to protect person or property from harm
• Harm may be intentional or nonintentional
– Sacrifices convenience for safety
• Information security
– Guarding digitally-formatted information:
• That provides value to people and organizations
10
Defining Information Security (cont’d.)
• Three types of information protection: often called
CIA
– Confidentiality
• Only approved individuals may access information
– Integrity
• Information is correct and unaltered
– Availability
• Information is accessible to authorized users
11
Defining Information Security (cont’d.)
• Protections implemented to secure information
– Identification
• Proof of who you are
– Authentication
• Individual is who they claim to be
– Authorization
• Grant ability to access information
– Accounting
• Provides tracking of events
12
CSC100 Computer Literacy - Comp Sec
INFORMATION
13 SECURITY TERMINOLOGY
14INFORMATIONSECURITY
TERMINOLOGY (CONT’D.)
• Risk - Event or action that causes loss of or damage to
computer system
• Vulnerability
– Flaw or weakness
15
Information Security Terminology
(cont’d.)
Options to deal with risk
– Accept
• Realize there is a chance of loss
– Diminish
• Take precautions
• Most information security risks should be
diminished
– Transfer risk to someone else
• Example: purchasing insurance
16
Figure 1-3 Information security components 17
THERE ARE THREE PRIMARY REASONS
FOR NETWORK SECURITY THREATS:
• Technology weaknesses
• Computer and network technologies have intrinsic security
weaknesses.
• Configuration weaknesses
• Network administrators or network engineers need to learn what
the configuration weaknesses are and correctly configure their
computing and network devices to compensate.
• Security policy weaknesses
• Security policy weaknesses can create unforeseen security
threats. The network may pose security risks to the network if
users do not follow the security policy.
• Human error
GOALS OF NETWORK SECURITY
• Determine authentication
• Identify assumptions
• Control secrets
CREATING A SECURE NETWORK
STRATEGY
• Limit access
• Perimeter security
• Control access to critical network applications, data, and services
continued…
CREATING A SECURE NETWORK
STRATEGY
• Firewalls
continued…
CREATING A SECURE NETWORK
STRATEGY
• Access control
• Ensures that only legitimate traffic is allowed
into or out of the network
• Passwords
• PINs
• Smartcards
continued…
CREATING A SECURE NETWORK
STRATEGY CONT…
• Change management
• Encryption
continued…
CREATING A SECURE NETWORK
STRATEGY
Unstructured threats
These consist of mostly inexperienced
individuals using easily available hacking
tools such as shell scripts and password
crackers
Structured threats
These come from hackers that are more
highly motivated and technically competent
THE FOUR PRIMARY CLASSES OF THREATS
TO NETWORK SECURITY CONT ….
External threats
These arise from individuals or organizations working
outside of a company. i.e. they do not have authorized
access to the computer systems or network.
Internal threats
These occur when someone has authorized access to
the network with either an account on a server or
physical access to the network.
Understanding the Importance of
Information Security
• Preventing data theft
– Security often associated with theft prevention
– Business data theft
• Proprietary information
– Individual data theft
• Credit card numbers
28
Understanding the Importance of
Information Security (cont’d.)
• Thwarting identity theft
– Using another’s personal information in unauthorized
manner
• Usually for financial gain
– Example:
• Steal person’s SSN
• Create new credit card account
• Charge purchases
• Leave unpaid
29
Understanding the Importance of
Information Security (cont’d.)
• Avoiding legal consequences
– Laws protecting electronic data privacy
• The Health Insurance Portability and Accountability
Act of 1996 (HIPAA)
• The Sarbanes-Oxley Act of 2002 (Sarbox)
• The Gramm-Leach-Bliley Act (GLBA)
• California’s Database Security Breach Notification Act
(2003)
30
Understanding the Importance of
Information Security (cont’d.)
• Foiling (preventing) cyberterrorism
– Premeditated, politically motivated attacks
– Target: information, computer systems, data
– Designed to:
• Cause panic
• Provoke violence
• Result in financial catastrophe
31
Understanding the Importance of
Information Security (cont’d.)
• Potential cyberterrorism targets
– Banking
– Military
– Energy (power plants)
– Transportation (air traffic control centers)
– Water systems
32
Who Are the Attackers?
• Categories of attackers
– Hackers
– Script kiddies
– Spies
– Insiders
– Cybercriminals
– Cyberterrorists
33
Hackers
• Hacker
– Person who uses computer skills to attack
computers
– Term not common in security community
• White hat hackers
– Goal to expose security flaws
– Not to steal or corrupt data
• Black hat hackers
– Goal is malicious and destructive
34
Script Kiddies
• Script kiddies
– Goal: break into computers to create damage
– Unskilled users
– Download automated hacking software (scripts)
• Use them to perform malicious acts
– Attack software today has menu systems
• Attacks are even easier for unskilled users
– 40 percent of attacks performed by script kiddies
35
Spies
• Computer spy
– Person hired to break into a computer:
• To steal information
• Hired to attack a specific computer or system:
– Containing sensitive information
• Goal: steal information without drawing attention to
their actions
• Possess excellent computer skills:
– To attack and cover their tracks
36
Insiders
• Employees, contractors, and business partners
• 48 percent of breaches attributed to insiders
• Examples of insider attacks
– Health care worker publicized celebrities’ health
records
• Disgruntled over upcoming job termination
– Government employee planted malicious coding
script
– Stock trader concealed losses through fake
transactions
– U.S. Army private accessed sensitive documents
37
Cybercriminals
• Network of attackers, identity thieves, spammers,
financial fraudsters
• Difference from ordinary attackers
– More highly motivated
– Willing to take more risk
– Better funded
– More tenacious
– Goal: financial gain
38
Cybercriminals (cont’d.)
• Cybercrime
– Targeted attacks against financial networks
– Unauthorized access to information
– Theft of personal information
• Financial cybercrime
– Trafficking in stolen credit cards and financial
information
– Using spam to commit fraud
39
Cyberterrorists
• Cyberterrorists
– Ideological motivation
• Attacking because of their principles and beliefs
• Goals of a cyberattack:
– Deface electronic information
• Spread misinformation and propaganda
– Deny service to legitimate computer users
– Commit unauthorized intrusions
• Results: critical infrastructure outages; corruption of
vital data
40
Attacks and Defenses
• Wide variety of attacks
– Same basic steps used in attack
• To protect computers against attacks:
– Follow five fundamental security principles
41
Steps of an Attack
• Probe for information
– Such as type of hardware or software used
• Penetrate any defenses
– Launch the attack
• Modify security settings
– Allows attacker to reenter compromised system
easily
• Circulate to other systems
– Same tools directed toward other systems
• Paralyze networks and devices
42
Figure 1-6
Steps of an attack
43
Defenses Against Attacks
• Fundamental security principles for defenses
– Layering
– Limiting
– Diversity
– Obscurity
– Simplicity
44
Layering
• Information security must be created in layers
– Single defense mechanism may be easy to
circumvent
– Unlikely that attacker can break through all defense
layers
• Layered security approach
– Can be useful in resisting a variety of attacks
– Provides the most comprehensive protection
45
Limiting
• Limiting access to information:
– Reduces the threat against it
• Only those who must use data granted access
– Amount of access limited to what that person needs
to know
• Methods of limiting access
– Technology
• File permissions
– Procedural
• Prohibiting document removal from premises
46
Diversity
• Closely related to layering
– Layers must be different (diverse)
• If attackers penetrate one layer:
– Same techniques unsuccessful in breaking through
other layers
• Breaching one security layer does not compromise
the whole system
• Example of diversity
– Using security products from different manufacturers
47
Obscurity
• Obscuring inside details to outsiders
• Example: not revealing details
– Type of computer
– Operating system version
– Brand of software used
• Difficult for attacker to devise attack if system
details are unknown
48
Simplicity
• Nature of information security is complex
• Complex security systems
– Difficult to understand and troubleshoot
– Often compromised for ease of use by trusted users
• Secure system should be simple:
– For insiders to understand and use
• Simple from the inside
– Complex from the outside
49
PART B
AUTHENTICATION
SECURITY OF SYSTEM
RESOURCES
• Three-step process (AAA)
• Authentication
• Positive identification of person/system seeking access to
secured information/services
• Authorization
• Predetermined level of access to resources
• Accounting
• Logging use of each asset
AUTHENTICATION TECHNIQUES
• Username
• Unique alphanumeric identifier used to identify an individual when
logging onto a computer/network
• Password
• Secret combination of keystrokes that, when combined with a
username, authenticates a user to a computer/network
BASIC RULES FOR PASSWORD
PROTECTION
1. Memorize passwords; do not write them down
2. Use different passwords for different functions
3. Use at least 6 characters
4. Use mixture of uppercase and lowercase letters,
numbers, and other characters
5. Change periodically
STRONG PASSWORD CREATION
TECHNIQUES
• Easy to remember; difficult to recognize
• Examples:
• First letters of each word of a simple phrase; add a number and
punctuation
• Asb4M?
• Combine two dissimilar words and place a number between them
• SleigH9ShoE
• Substitute numbers for letters (not obviously)
TECHNIQUES TO USE MULTIPLE
PASSWORDS
• Group Web sites or applications by appropriate level of
security
• Use a different password for each group
• Cycle more complex passwords down the groups, from most sensitive
to least
STORING PASSWORDS
• Written
• Keep in a place you are not likely to lose it
• Use small type
• Develop a personal code to apply to the list
• Electronic
• Use a specifically designed application (encrypts data)
DIGITAL CERTIFICATES
• Decryption
• Converts secret message into plain text message
• Symmetric cipher
• Uses only one key
• Asymmetric cipher
• Uses a key pair (private key and public key)
ELECTRONIC ENCRYPTION AND
DECRYPTION CONCEPTS
• Certificate authority (CA)
• Trusted, third-party entity that verifies the actual identity of an
organization/individual before providing a digital certificate
• Nonrepudiation
• Practice of using a trusted, third-party entity to verify the authenticity
of a party who sends a message
HOW MUCH TRUST
SHOULD ONE PLACE IN A CA?
• Reputable CAs have several levels of authentication that
they issue based on the amount of data collected from
applicants
• Example: VeriSign
SECURITY TOKENS
• Passive
• Act as a storage device for the base key
• Do not emit, or otherwise share, base tokens
• Active
• Actively create another form of a base key or encrypted form of a
base key that is not subject to attack by sniffing and replay
• Can provide variable outputs in various circumstances
ONE-TIME PASSWORDS
• Biometric authentication
• Uses measurements of physical or behavioral characteristics of an
individual
• Generally considered most accurate of all authentication methods
• Traditionally used in highly secure areas
• Expensive
HOW BIOMETRIC
AUTHENTICATION WORKS
1. Biometric is scanned after identity is verified
2. Biometric information is analyzed and put into an
electronic template
3. Template is stored in a repository
4. To gain access, biometric is scanned again
5. Computer analyzes biometric data and compares it to
data in template
6. If data from scan matches data in template, person is
allowed access
7. Keep a record, following AAA model
FALSE POSITIVES AND FALSE
NEGATIVES
• False positive
• Occurrence of an unauthorized person being authenticated by a
biometric authentication process
• False negative
• Occurrence of an authorized person not being authenticated by a
biometric authentication process when they are who they claim to be
DIFFERENT KINDS OF
BIOMETRICS
• Physical characteristics
• Fingerprints
• Hand geometry
• Retinal scanning
• Iris scanning
• Facial scanning
• Behavioral characteristics
• Handwritten signatures
• Voice
FINGERPRINT BIOMETRICS
HAND GEOMETRY AUTHENTICATION
RETINAL SCANNING
IRIS SCANNING
SIGNATURE VERIFICATION
GENERAL TRENDS IN
BIOMETRICS
• Authenticating large numbers of people over a short period
of time (eg, smart cards)
• Gaining remote access to controlled areas
MULTIFACTOR
AUTHENTICATION
• Identity of individual is verified using at least two of the
three factors of authentication
• Something you know (eg, password)
• Something you have (eg, smart card)
• Something about you (eg, biometrics)
ADDITIONAL READINGS
(NOT COMPULSORY)
78
Summary (cont’d.)
• Goals of information security
– Prevent data theft
– Thwart identity theft
– Avoid legal consequences of not securing
information
– Maintain productivity
– Foil cyberterrorism
• Different types of people with different motivations
conduct computer attacks
• An attack has five general steps
79